DDoS

12345678910
Across
  1. 3. DDoS An attack where the attacker sends spoofed requests to servers which then send responses to the victim, overwhelming it.
  2. 5. Measures and technologies used to defend networks and servers against DDoS attacks.
  3. 7. A security vulnerability exploited by attackers before it is discovered or patched by the manufacturer.
  4. 9. A technique where an attacker uses forged IP addresses to obscure the source of a DDoS attack.
  5. 10. The person or group behind the control and coordination of a botnet for DDoS attacks.
Down
  1. 1. DDoS An attack that leverages servers' high-bandwidth responses to overwhelm the victim.
  2. 2. A method where network traffic to the victim during a DDoS attack is redirected to mitigate the attack.
  3. 4. A group of infected computers controlled remotely by an attacker to perform DDoS attacks.
  4. 6. A computer or device controlled remotely by an attacker without the owner's knowledge to participate in DDoS attacks.
  5. 8. Flood A method where an attacker floods the target network with a high volume of data packets to overload it.